applications the cloud

Results 251 - 275 of 565Sort Results By: Published Date | Title | Company Name
Published By: Group M_IBM Q1'18     Published Date: Dec 19, 2017
For increasing numbers of organizations, the new reality for development, deployment and delivery of applications and services is hybrid cloud. Few, if any, organizations are going to move all their strategic workloads to the cloud, but virtually every enterprise is embracing cloud for a wide variety of requirements. To accelerate innovation, improve the IT delivery economic model and reduce risk, organizations need to combine data and experience in a cognitive model that yields deeper and more meaningful insights for smarter decisionmaking. Whether the user needs a data set maintained in house for customer analytics or access to a cloud-based data store for assessing marketing program results — or any other business need — a high-performance, highly available, mixed-load database platform is required.
Tags : 
cloud, database, hybrid cloud, database platform
    
Group M_IBM Q1'18
Published By: Dell and VMWare     Published Date: Dec 15, 2017
Public cloud will continue to be a viable deployment model for some applications, primarily software as a service (SaaS) and less differentiated horizontal workloads like test/dev and infrastructure. Workloads that define the business—the high value vertical applications or those containing confidential / sensitive data—will remain on-premises. Not everything can move to a public cloud, and each day sharpens the understanding that more IT deployments will be on-premises. Hybrid IT will be the de facto deployment strategy. It is simply unrealistic, except for very small businesses, to have an IT footprint that does not include a healthy dose of on-premises infrastructure. Intel Inside®. New Possibilities Outside. Intel® Xeon® processor Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, and Xeon Inside ar
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, intel logo, intel atom, intel atom inside
    
Dell and VMWare
Published By: Dell and VMWare     Published Date: Dec 15, 2017
Public cloud will continue to be a viable deployment model for some applications, primarily software as a service (SaaS) and less differentiated horizontal workloads like test/dev and infrastructure. Workloads that define the business—the high value vertical applications or those containing confidential / sensitive data—will remain on-premises. Not everything can move to a public cloud, and each day sharpens the understanding that more IT deployments will be on-premises. Hybrid IT will be the de facto deployment strategy. It is simply unrealistic, except for very small businesses, to have an IT footprint that does not include a healthy dose of on-premises infrastructure. Intel Inside®. Para un mundo de nuevas posibilidades. Procesador Intel® Xeon® Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, el logotipo de Intel, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, el logotipo de Intel Inside, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside,
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, el logotipo de intel, intel atom, intel atom inside
    
Dell and VMWare
Published By: Dell and VMWare     Published Date: Dec 15, 2017
Public cloud will continue to be a viable deployment model for some applications, primarily software as a service (SaaS) and less differentiated horizontal workloads like test/dev and infrastructure. Workloads that define the business—the high value vertical applications or those containing confidential / sensitive data—will remain on-premises. Not everything can move to a public cloud, and each day sharpens the understanding that more IT deployments will be on-premises. Hybrid IT will be the de facto deployment strategy. It is simply unrealistic, except for very small businesses, to have an IT footprint that does not include a healthy dose of on-premises infrastructure. Intel Inside®. Nya möjligheter på utsidan. Intel® Xeon® processor Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, and Xeon Inside
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, intel logo, intel atom, intel atom inside
    
Dell and VMWare
Published By: Insight     Published Date: Dec 05, 2017
Will you evolve with the digital workforce? New-era workers are breaking the confines of their cubicles. That means businesses need to offer more digital work experiences — but the path isn’t always clear. We’re rallying three workplace technology experts to discuss how to orchestrate a modern device and cloud application rollout to empower your anywhere, anytime workforce. Today’s solution landscape is ripe with effective ways to help organizations empower modern workers. In this exclusive Livestream, you’ll learn the true value of modern devices and cloud applications — and how to orchestrate every moving part of a connected workforce without compromising security.riving workplace disruption? This Livestream recording will reveal: -What’s driving workplace disruption? -What real-world tactics can we implement to conquer disruption? -How can we leverage the cloud? -What are the biggest challenges IT faces when modernizing?
Tags : 
technology, forum, workforce, workers, business, security
    
Insight
Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 30, 2017
When Barracuda first engaged with Rohde & Schwarz Cybersecurity in 2007, enterprises were more concerned about the unauthorized use of Skype, other P2P applications and instant messaging. Although the need for application control and awareness remains, enterprise concerns are shifting to securing enterprise applications hosted in private and public clouds, protecting east-west data center traffic and preventing unwanted traffic and malware on the corporate network.
Tags : 
firewall, r&s, visibility, application, network, secure, cloud, business applications
    
Rohde & Schwarz Cybersecurity
Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 28, 2017
When your solution needs deep packet inspection (DPI) application awareness as a key enabling feature, highly reliable and accurate identification of network traffic and applications - in real time - is an expected requirement. Whether it’s for software defined networks to enable policy control and critical traffic steering or to protect corporate networks, IoT devices, and cloud platforms from malicious attacks, it’s crucial to choose the right DPI solution.
Tags : 
signatures, cybersecurity, dpi, frameworks, automated, application, customers, benefits
    
Rohde & Schwarz Cybersecurity
Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 28, 2017
When Barracuda first engaged with Rohde & Schwarz Cybersecurity in 2007, enterprises were more concerned about the unauthorized use of Skype, other P2P applications and instant messaging. Although the need for application control and awareness remains, enterprise concerns are shifting to securing enterprise applications hosted in private and public clouds, protecting east-west data center traffic and preventing unwanted traffic and malware on the corporate network.
Tags : 
firewall, r&s, visibility, application, network, secure, cloud, business applications
    
Rohde & Schwarz Cybersecurity
Published By: McAfee EMEA     Published Date: Nov 15, 2017
The pressures of speed, efficiency, and cost will push more applications and data outside the trusted network and into a service provider’s clouds, where those benefits can be realized. The growth of cloud services and movement of sensitive data between private and public clouds means that those services will become increasingly valuable as targets of attack. As enterprises cloud-enable their operations, gaps in control, visibility, identity, and security are the most likely paths to data breaches.
Tags : 
cloud, optimization, speed, efficiency, costs, applications, data, services
    
McAfee EMEA
Published By: NetApp     Published Date: Nov 14, 2017
As companies’ transition to become digital enterprises, they must increasingly manage cost and performance across a hybrid IT environment. On-demand consumption strategies can be used to optimize your data storage costs, whether you are running applications in a private data center, across a hybrid cloud, or in the public cloud. Read this eBook and learn how on-demand consumption models can help you align IT spending with your business needs, both on-premises and in the cloud.
Tags : 
    
NetApp
Published By: Epicor     Published Date: Nov 07, 2017
Every manufacturing company has aspirations to grow. Growth is exciting, yet it can also be challenging. Arm yourself with the right enterprise applications and technology, and consider cloud ERP software as an important component of your arsenal as you strive for growth and battle for market share. This report from Mint Jutras—an independent research and advisory firm that specializes in analyzing the business impact of enterprise solutions—highlights how cloud applications allow businesses to grow by: • Quickly expanding into new territories • Tightening compliance and governance • More effectively implementing standard processes • Achieving greater visibility into the enterprise Download the Mint Jutras report today to learn how cloud ERP from Epicor can help your business grow.
Tags : 
erp software, cloud erp, manufacturing, epicor erp, cloud applications
    
Epicor
Published By: Epicor Software Corp     Published Date: Nov 07, 2017
Every manufacturing company has aspirations to grow. Growth is exciting, yet it can also be challenging. Arm yourself with the right enterprise applications and technology, and consider cloud ERP software as an important component of your arsenal as you strive for growth and battle for market share. This report from Mint Jutras—an independent research and advisory firm that specializes in analyzing the business impact of enterprise solutions—highlights how cloud applications allow businesses to grow by: • Quickly expanding into new territories • Tightening compliance and governance • More effectively implementing standard processes • Achieving greater visibility into the enterprise Download the Mint Jutras report today to learn how cloud ERP from Epicor can help your business grow.
Tags : 
erp software, cloud erp, manufacturing, epicor erp, cloud applications
    
Epicor Software Corp
Published By: Hewlett Packard Enterprise     Published Date: Nov 06, 2017
The Cloud, once a radical idea in IT, is now mainstream. Whether it’s email, backup or file sharing, most consumers probably use a cloud service or two. Similarly, most IT professionals are familiar with cloud service providers such as Amazon, Google and Microsoft Azure, and many companies have moved at least some of their information technology processes into the cloud. In fact, the cloud has become so popular it’s easy to assume that running IT applications on-premises is not cost competitive with a cloud based service. In this report Evaluator Group will test the validity of that assumption with a TCO (Total Cost of Ownership) model analyzing a hyperconverged appliance solution from HPE and a comparable cloud service from Amazon Web Services (AWS).
Tags : 
infrastructure, cost competitive, cloud, hyper converged, amazon web services, total cost of ownership, tco
    
Hewlett Packard Enterprise
Published By: DellEMC and Intel®     Published Date: Oct 25, 2017
Public cloud will continue to be a viable deployment model for some applications, primarily software as a service (SaaS) and less differentiated horizontal workloads like test/dev and infrastructure. Workloads that define the business—the high value vertical applications or those containing confidential / sensitive data—will remain on-premises. Not everything can move to a public cloud, and each day sharpens the understanding that more IT deployments will be on-premises. Hybrid IT will be the de facto deployment strategy. Learn more about Dell EMC enterprise solutions in collaboration with Intel®. Intel Inside®. New Possibilities Outside. Learn more about Dell EMC enterprise solutions in collaboration with Intel® Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, and Xeon Inside are trademarks of Inte
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, intel logo, intel atom, intel atom inside
    
DellEMC and  Intel®
Published By: DellEMC and Intel®     Published Date: Oct 25, 2017
Public cloud will continue to be a viable deployment model for some applications, primarily software as a service (SaaS) and less differentiated horizontal workloads like test/dev and infrastructure. Workloads that define the business—the high value vertical applications or those containing confidential / sensitive data—will remain on-premises. Not everything can move to a public cloud, and each day sharpens the understanding that more IT deployments will be on-premises. Intel Inside®. Intel otwiera nowe mozliwosci. Intel® Xeon® processor Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, and Xeon Inside are trademarks of Intel
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, intel logo, intel atom, intel atom inside
    
DellEMC and  Intel®
Published By: DellEMC and Intel®     Published Date: Oct 25, 2017
Public cloud will continue to be a viable deployment model for some applications, primarily software as a service (SaaS) and less differentiated horizontal workloads like test/dev and infrastructure. Workloads that define the business—the high value vertical applications or those containing confidential / sensitive data—will remain on-premises. Not everything can move to a public cloud, and each day sharpens the understanding that more IT deployments will be on-premises. Hybrid IT will be the de facto deployment strategy. Learn more about Dell EMC enterprise solutions in collaboration with Intel®. Intel Inside®. Nya möjligheter på utsidan. Intel® Xeon® processor Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, and Xeon Inside are trademarks of Intel
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, intel logo, intel atom, intel atom inside
    
DellEMC and  Intel®
Published By: DellEMC and Intel®     Published Date: Oct 25, 2017
Public cloud will continue to be a viable deployment model for some applications, primarily software as a service (SaaS) and less differentiated horizontal workloads like test/dev and infrastructure. Workloads that define the business—the high value vertical applications or those containing confidential / sensitive data—will remain on-premises. Not everything can move to a public cloud, and each day sharpens the understanding that more IT deployments will be on-premises. Learn more about Dell EMC enterprise solutions in collaboration with Intel® Intel Inside®. Para un mundo de nuevas posibilidades. Procesador Intel® Xeon® Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, el logotipo de Intel, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, el logotipo de Intel Inside, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi y Xeon Inside son marcas comerciales de Intel Corporation o de sus filiales en Estados Unidos y/o en otros países.
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, el logotipo de intel, intel atom, intel atom inside
    
DellEMC and  Intel®
Published By: OneLogin     Published Date: Oct 24, 2017
SaaS has fundamentally changed security requirements. We used to just go into work, and everything—corporate applications, sensitive customer data, employee health records, etc.—was within the “safe” four walls of the corporate network behind a firewall. Now employees work remotely and use mobile devices, including unmanaged, personal devices. They access SaaS apps that live in the cloud without any sort of firewall that IT can use to monitor and manage access. Prominent examples include Salesforce.com, Google Apps, Office 365, Box, and many others. As employees use these SaaS apps, they are creating proprietary company data, often confidential in nature, that exists outside the control of IT, creating new challenges for security teams. In this new world, IT needs to track sensitive corporate data in third-party SaaS apps, and ensure that only the right people have the right level of access to it. In this whitepaper, we’ll explain ten steps on how to do that
Tags : 
    
OneLogin
Published By: OKTA     Published Date: Oct 23, 2017
Most organizations have a dirty little secret: they are relying on user and password-based authentication to protect sensitive internal applications. With 81% of data breaches involving weak or stolen credentials1, applications that use single-factor authentication are an easy target for attack. Unfortunately, updating internal cloud applications—as well as legacy and custom applications—to support multi-factor authentication can be an IT headache for many organizations. Okta and Palo Alto Networks have collaborated to make rolling out multi-factor authentication a snap. Join Daniel Lu, Product Marketing Manager at Okta and Kasey Cross, Sr. Product Marketing Manager at Palo Alto Networks, to learn: >The latest trends in credential-based attacks >Why every sensitive cloud application needs multi-factor authentication >How to enforce network-level multi-factor authentication without touching your apps using Palo Alto Networks and Okta
Tags : 
    
OKTA
Published By: VMWare EMEA     Published Date: Oct 23, 2017
The VMware enterprise-ready, cloud management platform is purpose built for hybrid cloud, and designed to work in heterogeneous environments. It enables you to deliver and manage infrastructure and applications quickly for the business, while maintaining IT control. To learn more about the industry’s most complete cloud management platform, read about our customer deployments globally.
Tags : 
cloud optimization, cloud efficiency, cloud management, cloud assurance, cloud visibility, enterprise management, data management
    
VMWare EMEA
Published By: VMWare EMEA     Published Date: Oct 23, 2017
Today, applications facilitate commerce on a global scale. They play a key role in delivering products and services to customers, a role that directly affects the success of the business. Companies that rapidly deploy, update, and manage business applications have a competitive advantage. To maintain this fast pace, many organizations have adopted a hybrid cloud—a combination of private and public clouds—to become more agile. But true agility isn’t easy
Tags : 
cloud optimization, cloud efficiency, cloud management, cloud assurance, cloud visibility, enterprise management, data management
    
VMWare EMEA
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Despite long-standing concerns captured in a myriad of surveys, security in the cloud has progressed to a more practical and achievable level. The cloud represents a shared security responsibility model whereby that responsibility is split between the Cloud Service Provider and the cloud customer. For organisations moving some or all of their applications and data to the cloud, acceptance of this model clears the way to more thoughtful consideration for how security can and should be architected — from the ground up. As a result, IT and IT Security leaders now have a much clearer trajectory to support their business operations in the cloud in a secure manner.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection
    
Secureworks ABM UK 2017
Published By: Oracle     Published Date: Oct 20, 2017
Modern technology initiatives are driving IT infrastructure in a new direction. Big data, social business, mobile applications, the cloud, and real-time analytics all require forward-thinking solutions and enough compute power to deliver the performance required in a rapidly evolving digital marketplace. Customers increasingly drive the speed of business, and organizations need to engage with customers on their terms. The need to manage sensitive information with high levels of security as well as capture, analyze, and act upon massive volumes of data every hour of every day has become critical. These challenges will dramatically change the way that IT systems are designed, funded, and run compared to the past few decades. Databases and Java have become the de facto language in which modern, cloud-ready applications are written. The massive explosion in the volume, variety, and velocity of data increases the need for secure and effective analytics so that organizations can make bette
Tags : 
    
Oracle
Published By: Oracle     Published Date: Oct 20, 2017
Modern technology initiatives are driving IT infrastructure in a new direction. Big data, social business, mobile applications, the cloud, and real-time analytics all require forward-thinking solutions and enough compute power to deliver the performance required in a rapidly evolving digital marketplace. Customers increasingly drive the speed of business, and organizations need to engage with customers on their terms. The need to manage sensitive information with high levels of security as well as capture, analyze, and act upon massive volumes of data every hour of every day has become critical. These challenges will dramatically change the way that IT systems are designed, funded, and run compared to the past few decades. Databases and Java have become the de facto language in which modern, cloud-ready applications are written. The massive explosion in the volume, variety, and velocity of data increases the need for secure and effective analytics so that organizations can make bette
Tags : 
    
Oracle
Published By: Oracle     Published Date: Oct 20, 2017
Business Enterprises today need to become more agile, meet new and increasing workload and security requirements, while reducing overall IT cost and risk. To meet these requirements many companies are turning to cloud computing. To remain competitive companies need to formulate a strategy that can easily move them from traditional on-premises IT to private or public clouds. A complete cloud strategy will likely include both private and public clouds because some applications and data might not be able to move to a public cloud. Moving to the cloud should not create information silos but should improve data sharing. Any cloud strategy should make sure that it is possible to integrate on-premises, private cloud and public cloud data and applications. Furthermore, any on-premises cloud deployments must be able to easily migrate to public cloud in the future
Tags : 
    
Oracle
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.